Table Of
Contents
Intro toCybersecurity
Types of Job Roles in Cybersec
Roadmap & Resources
Getting involved with infosec Community
Hackers to Follow on Social Media
Hacking Podcasts to listen
Certifications You Should Have
Building Your Resume
Making Money in Cybersec
My Goals (Understanding
Plan/Goal Setting)
4.
Intro to
Cybersecurity
What isCyberSecurity ??
Cybersecurity is the art of protecting/recovering networks, devices, and data from unauthorized access or
criminal use and the practice of ensuring confidentiality, integrity, and availability of information. (Acording
to CISA)
Why we need Cybersecurity ??
-To Reduce the Risk of Data Breaches and attacks from Black Hat Hackers (APT and
Individual Hacking Groups).
- To Prevent Unauthorized access to sensitive information
- To Prevent Services Disruption (Like denial-of-service attacks)
-There are lot more reasons like (Ensuring Business continuity, Protecting from
network exploitations from outsiders)
Reference Blogs
https://medium.com/@ IamLucif3r/what-is-cyber-security-268cccd0f4eb
https://medium.com/beyondx/what-is-cybersecurity-64a5f61cd0e3
5.
Types of Job
Roles
-E t h i c a l H a c k e r / P e n e t r a t i o nT e s t e r
- C h i e f I n f o r m a t i o n S e c u r i t y o f f i c e r ( C I S O )
- M a l w a r e A n a l y s t
- E x p l o i t D e v e l o p e r
- I n c i d e n t r e s p o n d e r / F o r e n s i c A n a l y s t
- C r y p t o g r a p h e r
- S e c u r i t y A r c h i t e c t
- S e c u r i t y E n g i n e e r
- S e c u r i t y A n a l y s t
- S e c u r i t y C o n s u l t a n t
- S e c u r i t y R e s e a r c h e r s
References
https://vickieli.medium.com/cybersecurity-careers-your-options-8999bd8254e5
https://somyt536.medium.com/what-are-the-various-job-roles-offered-in-cybersecurity-942d5885170c
https://medium.com/@shankarbala95/cybersecurity-its-various-roles-that-you-should-know-8d8f1ef6e1cd
6.
Let's Understand theseJob Roles ...
Ethical Hacker / Penetration Tester
- Hacking for good with written permission.
- Simulation Attacks on Network.
- Tries Not to Harm the infrastucture during Live attacks.
- Takes care of informative to High impact bugs.
- Provides a full test report and finding (Report writting).
- Need Good Communication skills.
- Part of Red team
Chief information Security Officer (CISO)
- Head of Security Team
- Directs the Strategy, operations & Budget for security.
- Responsible for major Security Decisions
Malware Analyst
- Identifies malware in a Computer or Network.
- Reverse Engineer malware to understand its functionality.
- Identifies ways to detect and prevent the malware from spreading.
7.
Let's Understand theseJob Roles ...
Exploit Developer
-Uses research and findings to creates exploit
codes to exploit the vulnerabilities.
Incident Responder /
Forensic Analyst
- Helps to analyze/recover erased/encrypted
data.
- Analyzes and Monitors all network activities
and logs.
- Helps to identify intrusions or suspicious
activities inside network.
- Part of Blue Team.
- Works with Red team to fix the Bugs and
Vulnerabilities
Cryptographer
-Develops algorithms and security systems to encrypt Confidential
information.
8.
Let's Understand theseJob Roles ...
Security Architect
-Develops and organizes secured computer systems and networks
to protect confidential information from hackers.
Security Engineer
-Liable for testing and screening various security software
employed, for improving organizational security.
Security Analyst
-Performs several security related operations such as password
complexity, data loss mitigation, and other security practices.
Security Consultant
- Position Mostly found in small organisations.
-Helps to strengthen security , by providing consultation and
technical help.
9.
Let's Understand theseJob Roles ...
Security Researchers
-They helps to predict the future vulnerabilities by tracking current
vulnerabilities.
-Research on products to find unknown or zero day vulnerabilities,
which may be actively being exploited.
To Know about Life of a Security Researcher , Check
out this blog
https://cybersecurity.att.com/blogs/security-essentials/the-life-of-a-
security-researcher
Getting involved withinfosec
Community
Where to Find Good(Ethical) hackers ??
Twitter - Most hackers/Researchers are on twitter.
Youtube - They also helps Community to learn through Youtube
Discord - They Have Discord Servers to talk/share stuffs with each other.
Medium - They helps Community by writing there work/findings.
Reddit - Infosec thread.
Linkedin - They Have professional profiles too.
Forums - You can Find Black Hat Hackers too.
Github - They helps community by building tools and sharing there tools.
Telegram - Some awesome Groups are there.
So What to do ?? Where to start from ??
Join Twitter Today, and Follow the Hackers mentioned in next slide.
15.
List of Hackersto Follow
Twitter
https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-
Hunters/blob/master/assets/media.md#twitter
Youtube
https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-
Hunters/blob/master/assets/media.md#youtube-channels
Streamers
https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-
Hunters/blob/master/assets/media.md#streamers
Discord Servers
https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-
Hunters/blob/master/assets/media.md#discord-servers
Resume Building
Understand FromExperts in Infosec
John Hammond
https://youtu.be/ZAt8MM8WG0o
Jhaddix/Nahamsec
https://youtu.be/Zs28J_SDXYQ
20.
Making Money inCybersec
Bug Bounty Hunting
Hackerone
Bugcrowd
Open Bug Bounty
YesWeHack
intigriti
Synack Red Team
(SRT)
Reference :
https://www.hackero
ne.com/ethical-
hacker/how-become-
successful-bug-bount
y-hunter
Other Ways
Penetration Testing (On demand)